Nicolas Courtois

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

34EENicolas Courtois, Gregory V. Bard, David Wagner: Algebraic and Slide Attacks on KeeLoq. FSE 2008: 97-115
33EENicolas Courtois, Blandine Debraize: Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. ICICS 2008: 328-344
32EECôme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert: SOSEMANUK: a fast software-oriented stream cipher CoRR abs/0810.1858: (2008)
31EENicolas Courtois, Gregory V. Bard: Algebraic Cryptanalysis of the Data Encryption Standard. IMA Int. Conf. 2007: 152-169
30EENicolas Courtois: How Fast can be Algebraic Attacks on Block Ciphers?. Symmetric Cryptography 2007
29EENicolas Courtois, Blandine Debraize: Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. WEWoRC 2007: 100-113
28EENicolas Courtois, Blandine Debraize, Eric Garrido: On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. ACISP 2006: 76-86
27EEAline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214
26EENicolas Courtois, Louis Goubin: An Algebraic Masking Method to Protect AES Against Power Attacks. ICISC 2005: 199-209
25EENicolas Courtois: Cryptanalysis of Sfinks. ICISC 2005: 261-269
24EENicolas Courtois: The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. AES Conference 2004: 170-188
23EENicolas Courtois: General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. AES Conference 2004: 67-83
22EENicolas Courtois: Feistel Schemes and Bi-linear Cryptanalysis. CRYPTO 2004: 23-40
21EEBo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois: On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. ICICS 2004: 401-413
20EENicolas Courtois: Algebraic Attacks on Combiners with Memory and Several Outputs. ICISC 2004: 3-20
19EENicolas Courtois: Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. Public Key Cryptography 2004: 201-217
18EENicolas Courtois: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. CRYPTO 2003: 176-194
17EENicolas Courtois, Jacques Patarin: About the XL Algorithm over GF(2). CT-RSA 2003: 141-157
16EENicolas Courtois, Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback. EUROCRYPT 2003: 345-359
15EEMehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin: A Fast and Secure Implementation of Sflash. Public Key Cryptography 2003: 267-278
14EENicolas Courtois, Magnus Daum, Patrick Felke: On the Security of HFE, HFEv- and Quartz. Public Key Cryptography 2003: 337-350
13EENicolas Courtois: Generic Attacks and the Security of Quartz. Public Key Cryptography 2003: 351-364
12EENicolas Courtois, Josef Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT 2002: 267-287
11EENicolas Courtois: Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. ICISC 2002: 182-199
10EENicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier: Solving Underdefined Systems of Multivariate Quadratic Equations. Public Key Cryptography 2002: 211-227
9EENicolas Courtois, Matthieu Finiasz, Nicolas Sendrier: How to Achieve a McEliece-Based Digital Signature Scheme. ASIACRYPT 2001: 157-174
8EENicolas Courtois: Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. ASIACRYPT 2001: 402-421
7EENicolas Courtois: The Security of Hidden Field Equations (HFE). CT-RSA 2001: 266-281
6EEJacques Patarin, Nicolas Courtois, Louis Goubin: QUARTZ, 128-Bit Long Digital Signatures. CT-RSA 2001: 282-297
5EEJacques Patarin, Nicolas Courtois, Louis Goubin: FLASH, a Fast Multivariate Signature Algorithm. CT-RSA 2001: 298-307
4EELouis Goubin, Nicolas Courtois: Cryptanalysis of the TTM Cryptosystem. ASIACRYPT 2000: 44-57
3EENicolas Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. EUROCRYPT 2000: 392-407
2EEJacques Patarin, Louis Goubin, Nicolas Courtois: C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. ASIACRYPT 1998: 35-49
1EEJacques Patarin, Louis Goubin, Nicolas Courtois: Improved Algorithms for Isomorphisms of Polynomials. EUROCRYPT 1998: 184-200

Coauthor Index

1Mehdi-Laurent Akkar [15]
2Gregory V. Bard [31] [34]
3Côme Berbain [27] [32]
4Olivier Billet [32]
5Anne Canteaut [32]
6Jiun-Ming Chen [21]
7Magnus Daum [14]
8Blandine Debraize [27] [28] [29] [33]
9Romain Duteuil [15]
10Patrick Felke [14]
11Matthieu Finiasz [9]
12Eric Garrido [28]
13Henri Gilbert [32]
14Louis Goubin [1] [2] [4] [5] [6] [10] [15] [26] [32]
15Aline Gouget [27] [32]
16Louis Granboulan [32]
17Alexander Klimov [3]
18Cédric Lauradoux [32]
19Willi Meier [10] [16]
20Marine Minier [32]
21Chris J. Mitchell [27]
22Jacques Patarin [1] [2] [3] [5] [6] [17]
23Josef Pieprzyk [12]
24Thomas Pornin [32]
25Nicolas Sendrier [9]
26Adi Shamir [3]
27Hervé Sibert [27] [32]
28Jean-Daniel Tacier [10]
29David Wagner [34]
30Bo-Yin Yang [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)